CVE-2000-0461 Details

CVE-2000-0461

Published: 2000-05-29
Last Modified: 2008-09-10
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 2.1/10
Exploit Score 3.9/10
Access Vector Local
Access Complexity Low
Authentication None
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact Partial
Integrity Impact None
Vector String AV:L/AC:L/Au:N/C:N/I:N/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:* Yes - -
cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:* Yes - -
References

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc
ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc
http://www.openbsd.org/errata26.html#semconfig
http://www.securityfocus.com/bid/1270

CVE ID
CVE-2000-0461
Published
2000-05-29
Modified
2008-09-10
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.